Firewalls as an Internet Security Tool
Christoph Schuba - PhD Candidate, Purdue University
Sep 09, 1994
AbstractThe current level of security in the Internet seems secure only to the
totally oblivious. One practical action to guard security domains
against untrusted networks is the physical separation of the
demilitarized zone from the rest of the Internet, allowing only a few
dedicated machines to transmit data between them according to
established policies: firewall routers.
Determining a suitable network topology and configuration of firewalls
is a process that includes the definition of a security policy, a
formal description of allowed and denied traffic in terms of a logical
expression of packet fields, and its implementation. Purpose,
topologies, capabilities, and limitations of firewalls are worth
examining, as well as how firewalls work in the presence of vital
There are some currently open questions including the
integration of firewall technology with emerging information and
multimedia services, windowing systems, formal specification
of filtering rules, and the presence of gigabit networking.
The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.